Search Results - (( developing agent connection algorithm ) OR ( java loading optimization algorithm ))
Search alternatives:
- connection algorithm »
- loading optimization »
- developing agent »
- java »
-
1
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…This research proposes an enhancement of the ant colony optimization algorithm that caters for dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Monograph -
2
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…This research proposes an Enhanced Ant Colony Optimization (EACO) algorithm that caters dynamic scheduling and load balancing in the grid computing system. …”
Get full text
Get full text
Get full text
Thesis -
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
6
Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR)
Published 2013“…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
Get full text
Get full text
Get full text
Article -
7
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
8
Analysis of a multilevel voltage-based coordinating controller for solar-wind energy generator: a simulation, development and validation approach
Published 2021“…The developed model has different tasks to perform when solar-wind energy sources both produce output voltages simultaneously, also contributing to solving the requirements of different synchronization algorithms for a multi-agent renewable energy system. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Semantic-Based Scalable Decentralized Grid Resource Discovery
Published 2009“…We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
10
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…In addition, another two agents have been developed based on Monte Carlo simulation. …”
Get full text
Get full text
Thesis -
11
-
12
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. …”
Get full text
Get full text
Thesis -
13
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
14
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
Get full text
Get full text
Thesis
